Schnorr ring signature scheme with specified verifiability
A technology of specified verification and ring signature, applied in user identity/authority verification, digital transmission system, electrical components, etc., can solve the problems of high signature complexity, high implementation cost, complicated interaction process, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The present invention will be further clarified below in conjunction with the drawings and specific embodiments.
[0044] Such as figure 1 As shown, it is a common Schnorr ring signature scheme (Herranzetal, 2003), which includes three steps of system initialization, signature generation, and signature verification. The Schnorr ring signature scheme with specified verifiability is based on it. Added the steps of identity confirmation, such as figure 2 As shown, the program includes a system initialization module, a signature module, a verification module, and a confirmation module; the program selects the system parameters for generating the signature and the verification signature, and generates the public and private keys of the ring members; the members use the private key to sign the message; The public parameters of the system and the public keys of all ring members are used to verify the message signature; the signer uses the public key of the designated verifier t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
